Re: [RFC] PCI: Unassigned Expansion ROM BARs
From: Myron Stowe
Date: Sun Sep 27 2015 - 15:29:56 EST
On Wed, Sep 23, 2015 at 8:47 PM, Myron Stowe <myron.stowe@xxxxxxxxx> wrote:
snip
>
> The kernel expects device Expansion ROM BARs to be programmed with valid
> values - even if the respective Expansion ROM's Enable bit is 0 (i.e. the
> deviceâs expansion ROM address space is disabled). This seems to be the
> main contention point with said BIOS engineers. If an Expansion ROM BAR is
> not programmed, the kernel will attempt to find available resources and, if
> successful, program it. As this occurs various 'dmesg' entries
> related to kernel's actions are output.
>
The respective BIOS engineers from the two major vendors exhibiting the
behavior outlined are aware of, and monitoring, this thread. With the
exception of Daniel's recent post, there hasn't been much substance presented
supporting the OS's viewpoint to encourage the BIOS engineers to enter
into any kind of discussion. The majority of the responses have gone
straight towards how the OS can effectively work around platform's that
exhibit such setups. I'd like to step back and present known instances of
the OS's need(s) to access the Expansion (a.k.a. option) ROMs - something
for the BIOS engineers to consider; something with which to start a
dialogue.
There are at least three known major reasons why Linux uses the ROMs:
1) For many of the video cards, Linux has drivers that assume the card has
been initialized by the ROM. The drivers work fine, but they aren't smart
enough to work with the card straight out of reset - a lot of which is due
to specific vendor's keeping their devices closed; the code remains
proprietary. When such devices are reset when the OS is running (i.e.
when X is restarted), the OS has to run the ROM before the driver works
again. Alex Williamson and Daniel Blueman both covered this fairly well,
including the current dificiencies of such, in prior threads.
2) As Daniel further expressed, hot-plug scenarios and PCI domains which
may not be visible to the BIOS at initial boot, may need to access the
ROMs. In these environments - PCI hiearchies shared among multiple,
distinct, servers; hiearchies using non-transparent bridges - option ROMs
handed off by the BIOS unassigned need to be allocated by the OS so that
they can be accessed under these circumstances.
3) Virtualized guest environments where a device may be assigned to a
virtualized guest is an interesting case. In such environments the host
OS effectively functions as the meta-level BIOS, setting up a guest's
environment (virtual platform) prior to instantianting it. Within such a
context consider a simple example:
NIC devices often have Preboot Execution Environment (PXE) code in their
ROMs. In a bare-metal scenario, the BIOS (a.k.a. platform firmware)
obtains the PXE code from the ROM and initiates its execution. In this
scenario, once the OS is up and running there would seem to be no
further need to access such device's ROMs.
If we now extend the scenario one meta-level to include virtualization,
the host OS [1] assumes the role of bare-metal environment's BIOS and
the virtualized guest takes on the role of bare-metal OS. As such, if
the guest is booted via PXE from a NIC device, the meta-level BIOS
(QEMU/seabios) needs the ROM's content in order initiate PXE execution
to bring up the guest.
So in virtualized environments, it becomes obvious that all the
traditional BIOS ROM related actions extend to the (host) OS - PXE
booting, device initialization, hot-plug, and directly assigning physical
devices to virtualized guests, etc.
[1] "host OS" is used here in the generalized sence (i.e. it is in
control and thus the subsequent use of QEMU and seabios are not
specifically differentiated).
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/